A Security Patch for a Three-Party Key Exchange Protocol

被引:0
|
作者
ZHAO Jianjie1
2.Department of Computer Science and Engineering
机构
基金
国家高技术研究发展计划(863计划);
关键词
information security; authentication; key exchange; man-in-the-middle attack;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values V Aand VB in the CLC protocol will make a man-in-the-middle attack feasible in practice, where V Aand VB are the authentication information chosen by the server for the participants A and B . In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.
引用
收藏
页码:242 / 246
页数:5
相关论文
共 50 条
  • [31] A simple three-party password-based key exchange protocol
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) : 857 - 862
  • [32] Verifiable three-party secure key exchange protocol based on eigenvalue
    Zhang Y.
    Wang Z.
    Wang Z.
    Chen H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (12): : 149 - 154
  • [33] Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol
    Sinha, Vivek Kumar
    Anand, Divya
    Kaur, Sandeep
    Singh, Pankaj
    Noya, Irene Delgado
    SYMMETRY-BASEL, 2022, 14 (08):
  • [34] Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
    Tso, Raylin
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 863 - 874
  • [35] Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
    Raylin Tso
    The Journal of Supercomputing, 2013, 66 : 863 - 874
  • [36] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho CHOU
    Kuo-yu TSAI
    Tzong-chen WU
    Kuo-hui YEH
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2013, 14 (05) : 347 - 355
  • [37] Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol
    Wu, Shuhua
    Chen, Kefei
    Zhu, Yuefei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 215 - 221
  • [38] An Efficient Three-Party Authentication Key Exchange Protocol for Wireless Sensor Networks
    Li, Hongtu
    Hu, Liang
    Chu, Jianfeng
    Chi, Ling
    Li, Hongwei
    SENSOR LETTERS, 2013, 11 (05) : 990 - 996
  • [39] Hybrid Protocol for Password-based Key Exchange in Three-party Setting
    He Xinzheng
    Ru Bei
    Fei Jinlong
    Xun Baocheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 119 - +
  • [40] Enhanced password-based simple three-party key exchange protocol
    Kim, Hyun-Seok
    Choi, Jin-Young
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 107 - 114